Blogposts about cyber security in general, pentest, cloud security and red teaming from our team.
The Log4Shell zero-day vulnerability is considered highly security-critical. It allows attackers to execute arbitrary code.
The new coalition agreement aims to strengthen the law on the Internet and advance society in terms of cyber security.
The reasons for penetration testing are numerous and yet, from a legal perspective, they are often in a gray area.
An analysis of a Saudi Arabian activist's smartphone revealed that NSO Group used a zero-click exploit against iMessage.
A powerful tool, the Cybersecurity Framework helps NIST organize and improve your cybersecurity at the same time.
A phishing simulation is an often used tool to simulate or fake cyber attacks.
Schedule a no-obligation initial consultation with one of our sales representatives. Use the following link to select an appointment: